ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Anomaly Detection of Access Patterns in Database
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jong-hyuk Roh, Sung-Hun Lee, Soohyung Kim
Issue Date
2015-10
Citation
International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1115-1118
Publisher
IEEE
Language
English
Type
Conference Paper
Abstract
Data security has a critical role in the larger context of information and system security. In this paper, we propose the anomaly detection system for securing database. Our approach is based on analyzing the user’s access pattern stored in database log and detecting the anomalous access event. We consider three methods for this, user pattern analysis, machine learning analysis, and rule-based access control. Our experimental evaluation on both real and virtual database shows that our approaches work well.
KSP Keywords
Access pattern, Data security, Detection Systems(IDS), Rule-based access control, System security, User pattern, anomaly detection system, experimental evaluation, machine Learning, pattern analysis